SERTIT, P.O. Box 14, N-1306 Bærum postterminal, NORWAY
Phone: +47 67 86 40 00 Fax: +47 67 86 40 09 E-mail: [email protected] Internet: www.sertit.no
Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security
SERTIT-054 CR Certification Report Issue 1.0 7 March 2014
Huawei USN9810 Unified Service Node V900R012
CERTIFICATION REPORT - SERTIT STANDARD REPORT TEMPLATE SD 009 VERSION 2.1 11.11.2011
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 2 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
ARRANGEMENT ON THE RECOGNITION OF COMMON CRITERIA CERTIFICATES IN
THE FIELD OF INFORMATION TECHNOLOGY SECURITY
SERTIT, the Norwegian Cert if ication Author ity for IT Sec ur ity, is a member of the
above Arrangement and as such this conf irms that the Common Criteria cert if icate
has been issued by or under the authority of a Party to this Arrangement and is the
Party’s cla im that the cert if icate has been issued in accordance with the terms of
this Arrangement
The judgements contained in the cert if icate and Cert if ication Report are those of
SERTIT which issued it and the Norwegian evaluation facil ity (EVIT) which carried
out the evaluation. There is no impl ication of acceptance by other Members of the
Agreement Group of l iabil ity in respect of those judgements or for loss sustained as
a result of rel iance placed upon those judgements by a third party.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 3 of 21
Contents
Certification Statement 5
1 Abbreviations 6
2 References 8
3 Executive Summary 9
3.1 Introduction 9
3.2 Evaluated Product 9
3.3 TOE scope 9
3.4 Protection Profile Conformance 9
3.5 Assurance Level 9
3.6 Security Policy 9
3.7 Security Claims 10
3.8 Threats Countered 10
3.9 Threats Countered by the TOE’s environment 10
3.10 Threats and Attacks not Countered 10
3.11 Environmental Assumptions and Dependencies 10
3.12 IT Security Objectives 11
3.13 Non-IT Security Objectives 11
3.14 Security Functional Components 12
3.15 Security Function Policy 12
3.16 Evaluation Conduct 12
3.17 General Points 13
4 Evaluation Findings 14
4.1 Introduction 15
4.2 Delivery 15
4.3 Installation and Guidance Documentation 15
4.4 Misuse 15
4.5 Vulnerabil ity Analysis 15
4.6 Developer’s Tests 16
4.7 Evaluators’ Tests 16
5 Evaluation Outcome 17
5.1 Certification Result 17
5.2 Recommendations 17
Annex A: Evaluated Configuration 19
TOE Identification 19
TOE Documentation 20
TOE Configuration 21
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 4 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
Huawei USN981 0 Unified Service Node Version V900RO 12 EAL3+
,,. .... -,.. ...-·· .... .... .. . , , .
,
•.
Ce1rtification Statement
Huawei Technologies , Co. , Ltd Huawei USN9810 Unified Service Node provides the
functions of the serving GPRS support node (SGSN) and mobility management entity
(MME) and can be used as a separate SGSN , separate MME , or combined SGSNjMME.
The USN9810 can also be used as a single network el 巳 ment (NE) to manage other USN
9810s.
Huawei USN9810 Unified Service Node version V900R012 has been evaluated under
the terms of the Norwegian Certification Scheme for IT Security and have met the
Common Criteria Part 3 (ISO{IEC 15408) augmented requir芒 ments of Evaluation
Assurance Level EAL3+ ALC_CMC.4 for the specified Common Criteria Part 2 (ISOIIEC
15408) conformant functionality in the specified environment when running on the
platforms specified in Annex A.
lA ~t"h;; r 一一←一 -7KJJ55ι丁Kja 「 taA95 万人工
Certifier /气/1fVC.-Sl-均4ι一一一
Quality Assurance
:17:Lance jdJhJApproved
问问 IDate app刚ed
;二JFJ: 气斗士ω
SERTIT -054 CR Issue 1.0 Page 5 of 21
7 March 2014
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 6 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
1 Abbreviations
ACL Access Control L ist
CC Common Criteria for Information Technology Secur ity Evaluat ion
( ISO/IEC 15408)
CCRA Arrangement on the Recognit ion of Common Criter ia Cert if icates in the
Field of Information Technology Security
CEM Common Methodology for Information Technology Security Evaluation
CLI Command Line Interface
EAL Evaluation Assurance Level
ECU Enhanced Control Plane
EOR Evaluation Observation Repor t
EPU Enhanced Packet Forward Unit
ETI E1/T1 Interface board
ETR Evaluation Technica l Report
EVIT Evaluation Faci l ity under the Norwegian Cert i f ication Scheme for IT
Secur ity
EWP Evaluation Work Plan
GPRS General Packet Radio Service
GUI Graphical User Interface
LMT Local Maintenance Terminal
MME Mobil ity Management Entity
NE Network Element
NTP Network Time Protocol
OMU Operation and Maintenances Unit
PFI Packet Forward Interface
POC Point of Contact
PP Protect ion Profi le
QP Qualif ied Part ic ipant
SDM Shelf Data Module
SERTIT Norwegian Cert if ication Author ity for IT Security
SFR Secur ity Functional Requirement
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 7 of 21
SGSN Serving GPRS Support Node
SPM Secur ity Pol icy Model
ST Secur ity Target
SWU Switch Unit
TMI Time Master Interface
TOE Target of Evaluation
TSF TOE Secur ity Functions
TSI Time Slave Interface
TSP TOE Secur ity Pol icy
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 8 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
2 References
[1] Huawei USN9810 Vers ion 900 Release 12 Security Target , 1.5, 2014-02-17
[2] Common Criteria Part 1, CCMB-2012-09-001, Version 3.1 R4, September
2012.
[3] Common Criteria Part 2, CCMB-2012-09-002, Version 3.1 R4, September
2012.
[4] Common Criteria Part 3, CCMB-2012-09-003, Version 3.1 R4, September
2012.
[5] The Norwegian Cert if ication Scheme, SD001E, Version 8.0, 20 August 2010 .
[6] Common Methodology for Information Technology Security Evaluation,
Evaluation Methodology, CCMB-2012-09-004, Version 3.1 R4, September
2012.
[7] Evaluation Technica l Report Common Criteria EAL3+ Evaluation of Huawei
USN9810 Unif ied Service Node V900R012 , v 1 .2, Febuary 17 2014.
[8] USN9810 Product Documentation V900R012C00, 2013/08/05
[9] Common Criteria Secur ity Evaluation – Cert i f ied Configuration V1.2, 2013-
11-12.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 9 of 21
3 Executive Summary
3.1 Introduction
This Cert if ication Report states the outcome of the Common Criter ia security
evaluation of Huawei USN9810 Unif ied Service Node vers ion V900R012 to the
Sponsor, Huawei Technologies , Co. , Ltd , and is intended to ass ist prospective
consumers when judging the suitabil ity of the IT security of the product for their
part icular requirements.
Prospective consumers are advised to read this report in conjunct ion with the
Secur ity Target [1] which specif ies the functional , environmental and assurance
evaluation components .
3.2 Evaluated Product
The version of the product evaluated was Huawei USN9810 Unif ied Service Node
version V900R012.
This product is a lso described in this report as the Target of Evaluation (TOE) . The
developer was Huawei Technologies, Co. , Ltd .
The USN9810 is a unif ied serv ice node that can be used in GPRS, UMTS, and EPC
networks. The USN9810 provides the functions of the serv ing GPRS support node
(SGSN) and mobi l ity management entity (MME) and can be used as a separate SGSN,
separate MME, or combined SGSN/MME. The USN9810 can a lso be used a s a single
network e lement (NE) to manage other USN 9810s.
Details of the evaluated configuration, including the TOE’s supporting guidance
documentation, are given in Annex A.
3.3 TOE scope
The TOE scope is described in the ST [1] , chapter 1.4.
3.4 Protection Profile Conformance
The Secur ity Target [1] did not c laim conformance to any protection prof i le .
3.5 Assurance Level
The assurance incorporated predef ined evaluation assurance level EAL3, augmented
by ALC_CMC.4. Common Criteria Part 3 [4] describes the scale of assurance given by
predef ined assurance levels EAL1 to EAL7. An overview of CC is given in CC Part 1 [2] .
3.6 Security Policy
The TOE secur ity pol icies are detailed in are specif ied in the ST [1] , chapter 3.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 10 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
3.7 Security Claims
The Secur ity Target [1] fully specif ies the TOE’s secur ity objectives, the threats which
these objectives meet and secur ity functional requirements and security functions to
elaborate the objectives. Al l of the SFR ’ s are taken from CC Part 2 [3] ; use of this
standard facil itates comparison with other evaluated products.
3.8 Threats Countered
T.Accountabil ityLoss:
TA.ROGUE_USER performs undesirable actions that he is al lowed to perform, or
attempts to perform actions he is not al lowed to, and this cannot be traced
back to TA.ROGUE_USER.
T.UnauthenticatedAccess:
TA.ROGUE_USER or TA.ROGUE_SYSTEM gains access to the TO E.
T.Unauthor izedAccess:
TA.ROGUE_USER gains access to commands or information he is not authorized
to access.
3.9 Threats Countered by the TOE’s environment
T.Eavesdrop:
TA.NETWORK is able to intercept , and potential ly modify or re -use,
information assets that are exchanged between the TOE cl ient (LMT) and the
TOE server part (OMU).
3.10 Threats and Attacks not Countered
No threats or attacks that are not countered are descr ibed.
3.11 Environmental Assumptions and Dependencies
It is assumed that the server part of the TOE and the workstation that is host ing the
cl ient part of the TOE are protected against unauthorized physical access.
It is assumed that the organization responsible for the TOE and its operational
environment has measures in place to establish trust into and tra in users of the TOE
commensurate with the extent of author ization that these users are given on the
TOE. (For example, super users and users that are assigned s imi lar privi leges are
assumed to be fully trustworthy and capable of operating the T OE in a secure manner
abiding by the guidance provided to them.) .
It is assumed that the customer`s configurations of connections to other trusted
devices are correct .
It is assumed the operational environment provides rel iable t ime stamps for the
generation of audit records and a database to store the audit records.
It is assumed that the Telecommunication Service networks are trusted.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 11 of 21
It is assumed that the systems in the Telecommunicat ion Service networks and the
EMS are trusted.
3.12 IT Security Objectives
O.Authentication:
The TOE shall authent icate management users of its user interfaces.
O.Authorization:
The TOE must implement an access control mechanism to differentiate
between different authorit ies for TOE users.
O.AccessControl:
The TOE shall refuse access by invalid devices or users .
O.Communicat ion:
The TOE shall implement logical protection measures for network
communication between the server part of the TOE and the c l ient part of the
TOE.
O.Audit:
The TOE shall be able to generate audit records for security-re levant events.
3.13 Non-IT Security Objectives
OE.Administration:
Those responsible for the operation of the TOE and its operational environment
must ensure that only authorized users have access to the management plane,
and in part icular to the part of the TOE and its data that is running in
management plane. This includes ensuring that audit records stored in the
database in the operational environment are protected against unauthorized
access, and that cryptographic keys and cert if ica tes are properly managed to
support the communications security mechanisms implemented by the TOE.
This also includes the restrict ion of physical access to the server part of the
TOE and the workstation hosting the cl ient , making the TOE unavai lable to
access f rom the consumer/application networks served by the network device,
and ensure that devices and networks the TOE assumes to be trusted are
indeed trustworthy.
OE.Support:
Those responsible for the operation of the TOE and its operational environment
must ensure that the operational environment provides rel iable t ime stamps
for the generation of audit records and a database to store these records.
OE.Users:
Those responsible for the operation of the TOE and its operational environment
must be trustworthy, and trained such that they are capable of securely
managing the TOE and fol lowing the provided guidance.
OE.Devices:
Those responsible for the operation o f the TOE must ensure that the
conf iguration of connections to trusted devices in the TOE environment is
correct .
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 12 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
3.14 Security Functional Components
FAU_GEN.1
FAU_GEN.2
FAU_SAR.1
FAU_SAR.3
FDP_ACC.1
FDP_ACF.1
FIA_AFL.1
FIA_ATD.1
FIA_SOS.1
FIA_UAU.2
FIA_UID.2
FMT_MSA.1
FMT_MSA.3
FMT_SMF.1
FMT_SMR.1
FPT_ITT.1
FTA_TSE.1
FTP_ITC.1/EMS
3.15 Security Function Policy
The TOE secur ity pol icies are detailed in are specif ied in the ST[1] , chapter 6.
3.16 Evaluation Conduct
The evaluation was carried out in accordance with the requirements of the
Norwegian Cert if ication Scheme for IT Secur ity as described in SERTIT Document
SD001E[5] . The Scheme is managed by the Norwegian Cert if ication Authority for IT
Secur ity (SERTIT) . As stated on page 2 of this Cert if ication Report , SERTIT is a
member of the Arrangement on the Recognit ion of Common Cr iteria Cert if icat es in
the Field of Information Technology Security (CCRA), and the evaluation was
conducted in accordance with the terms of this Arrangement.
The purpose of the evaluation was to provide assurance about the effectiveness of
the TOE in meet ing its Secur ity Target[1] , which prospective consumers are advised to
read. To ensure that the Secur ity Target [1] gave an appropr iate baseline for a CC
evaluation, it was f irst itself evaluated. The TOE was then evaluated against this
baseline. Both parts of the evaluation were performed in accordance with CC Part
3[4] and the Common Evaluation Methodology (CEM) [6] .
SERTIT monitored the evaluation which was carried out by the Br ightsight B.V.
Commercial Evaluation Facil ity (CLEF/EVIT) . The evaluation was completed when the
EVIT submitted the Evaluation Technical Report (ETR) [7] to SERTIT in 17.02.2014.
SERTIT then produced this Cert if ication Report .
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 13 of 21
3.17 General Points
The evaluation addressed the security funct ionality c laimed in the Sec urity Target [1]
with reference to the assumed operating environment specif ied by the Secur ity
Target[1] . The evaluated configuration was that specif ied in Annex A. Prospect ive
consumers are advised to check that this matches their identif ied requirements and
give due consideration to the recommendations and caveats of this report .
Cert if ication does not guarantee that the IT product is f ree from security
vulnerabil it ies . This Cert if ication Report and the belonging Cert if icate only reflect
the view of SERTIT at the t ime of cert if ication. It is furthermore the responsibi l ity of
users (both exist ing and prospective) to check whether any secur ity vulnerabil it ies
have been discovered s ince the date shown in this report . This Cert if ication Report is
not an endorsement of the IT product by SERTIT or any other organization that
recognizes or gives effect to this Cert if ication Report , and no warranty of the IT
product by SERTIT or any other organizat ion that recognizes or gives effect to this
Cert if ication Report is either expressed or implied.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 14 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
4 Evaluation Findings
The evaluators examined the following assurance classes and components taken from
CC Part 3[4] . These c lasses comprise the EAL 3 assurance package augmented with
ALC_CMC.4.
Assurance class Assurance components
Development ADV_ARC.1 Secur ity architecture description
ADV_FSP.3 Functional specif ication with complete
summary
ADV_TDS.2 Architectural design
Guidance documents AGD_OPE.1 Operational user guidance
AGD_PRE.1 Preparative procedures
Life-cycle support ALC_CMC.4 Production support , acceptance procedures
and automation
ALC_CMS.3 Implementation representation CM
coverage
ALC_DEL.1 Delivery procedures
ALC_DVS.1 Identif ication of secur ity measures
ALC_LCD.1 Developer defined l ife-cycle model
Secur ity Target
evaluation
ASE_CCL.1 Conformance cla ims
ASE_ECD.1 Extended components defin it ion
ASE_INT.1 ST introduct ion
ASE_OBJ.2 Secur ity objectives
ASE_REQ.2 Derived security requirements
ASE_SPD.1 Secur ity problem defin it ion
ASE_TSS.1 TOE summary specif ication
Tests ATE_COV.2 Analys is of coverage
ATE_DPT.1 Testing: bas ic design
ATE_FUN.1 Functional test ing
ATE_IND.2 Independent test ing – sample
Vulnerabil ity assessment AVA_VAN.2 Vulnerabil ity analysis
All assurance classes were found to be satisfactory and were awarded an overall
“pass” verdict .
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 15 of 21
4.1 Introduction
The evaluation addressed the requirements specif ied in the Security Target [1] . The
results of this work were reported in the ETR [7] under the CC Part 3 [4] headings. The
fol lowing sections note considerations that are of part icular relevance to either
consumers or those involved with subsequent assurance maintenance and re -
evaluation of the TOE .
4.2 Delivery
On receipt of the TOE, the consumer is recommended to check that the evaluated
version has been supplied, and to check that the secur ity of the TOE has not been
compromised in del ivery.
4.3 Installation and Guidance Documentation
Installat ion of the TOE must be performed complete ly in accordance with the
guidance in the Operat ional User Guidance documents [8][9] provided by the
developer. The Common Criteria Security Evaluation – Cert if ied Conf iguration
document[9] descr ibes al l necessary steps to configure the TOE in the cert if ied
conf iguration.
These documents are a col lection of al l secur ity relevant operations and sett ings that
must be observed to ensure that the TOE operates in a secure manner.
4.4 Misuse
There is always a r isk of intentional and unintentional misconfigurations that could
poss ibly compromise confidential information. Developers should follow the guidance
for the TOE in order to ensure that the TOE operates in a secure manner.
The guidance documents adequately describe the mode of operation of the TOE, al l
assumptions about the intended environment and all requirements for external
security. Sufficient guidance is provided for the consum er to effect ively use the TOE’s
security functions.
4.5 Vulnerability Analysis
The Evaluators’ vulnerabil ity analysis was based on both public domain sources and
the vis ibi l ity of the TOE given by the evaluation process.
The evaluators assessed which potential vulnerabil it ies were already tested by the
developer and assessed the results .
The remaining potentia l vulnerabil it ies were tested by Br ights ight on the f inal
version of the TOE.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 16 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
4.6 Developer’s Tests
The Developer Test Plan consists of 25 different categor ies. Each category conta ins
between 1 and 9 tests . However, only parts of sub -categories are related to security
functionality. The relevant tests in combination cover al l SFRs and TSFIs .
4.7 Evaluators’ Tests
For independent test ing it was decided to sample one test of each SFR relevant
category
This approach guaranteed a good spread of these tests over the SFRs/TSFIs . The
evaluator has a lso made sure that there is no overlap between these tests and the
tests in the next section, thereby maximizing coverage.
The evaluator also analysed the Developer Test Plan to see where addit ional ATE tests
could be performed, and selected 9 addit ional tests .
All of these tests were performed at the Huawei premises in Shenzhe n between 8t h
October and 11t h
October 2013.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 17 of 21
5 Evaluation Outcome
5.1 Certification Result
After due consideration of the ETR [7] , produced by the Evaluator s, and the conduct
of the evaluation, as witnessed by the Cert if ier , SERTIT has determined that Huawei
USN9810 Unif ied Service Node vers ion V900R012 meet the Common Criter ia Part 3
extended requirements of Evaluation Assurance Level EAL3+ augmented with
ALC_CMC.4 for the specif ied Common Criteria Part 2 conformant functional ity, in the
specif ied environment, when running on platforms specif ied in Annex A.
5.2 Recommendations
Prospective consumers of Huawei USN9810 Unified Service Node vers ion V900R012
should understand the specif ic scope of the cert if ication by reading this report in
conjunction with the Security Target[1] . The TOE should be used in accordance with a
number of environmental considerations as specif ied in the Security Target .
Only the evaluated TOE conf igurat ion should be instal led. This is specif ied in Annex A
with further relevant information given above under Section 3.3 “TOE Scope” and
Section 4 “Evaluation F indings”.
The TOE should be used in accordance with the supporting guidance documentation
included in the evaluated configuration.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 18 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 19 of 21
Annex A: Evaluated Configuration
TOE Identification
There is no special hardware requirement. Since the TOE already includes the
hardware components. The conf iguration of the hardware and software are l i sted
below:
Hardware
Name Version Description
OMU CN21UPBA2/
CN22UPBA6
The operation & maintenance unit (OMU) performs
the operations and maintenance of the system.
USI USIA7 Serving as the interface board of the UPB, the
USIA7 provides various external interfaces,
including:
Six gigabit Ethernet interfaces (10/100/1000M
auto-sensing) to other network devices
Standard VGA interface to the KVMS
USB interface to the keyboard and mouse
Hot swapping
ECU CN21UPBA3/
CN22UPBA3
The enhanced control plane unit (ECU) performs
the service process ing and charging functions
related to the control plane.
EPU MSPB0 The Enhanced Packet forward Unit (EPU) board
processes the serv ices related to the user plane.
ETI ETIA0/SSIA0
/SSIA2
Functioning as the rear board of the enhanced
control plane unit (ECU) , the E1/T1 interface board
(ETI) is generally used together with matching sub-
boards.
PFI PFIA0 Packet Forward Interface (PFI) as the rear board of
the broadband interface process ing board and the
rear board of the EPU board.
SWU SWUA1/SWU
B1
The SWU is a switch unit . It consists of an
exchange carrier board and a t ime divis ion
mult iplex ing (TDM) daughter board.
The SWU supports layer-2 network switching, TDM
narrowband switching, device management,
conf iguration restoration and hot swap.
TSI SWIA0/SWIB The Time Slave Interface (TSI) board is used in the
extended sub rack supporting cascading between
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
Page 20 of 21 SERTIT-054 CR Issue 1.0
7 March 2014
0 sub-racks and provides the clock receive function.
TMI SWIA1/SWIB
1
The Time Master Interface (TMI) board is used in
the extended sub rack supporting cascading
between sub racks and provides the clock r eceive
function.
SMM SMMD/SMM
E
The SMM board is used to manage al l hardware in
the OSTA 2.0 sub rack including the sub rack,
boards of al l types, fan tray to implement the
device management, event management, asset
management, power management, remote
maintenance, conf iguration restoration, and power
saving control .
SDM SDM The SDM (Shelf Data Module) stores the sub rack
asset information, such as sub rack name, bar
code, vendor, and del ivery date.
Software
Name Version
USN9810 V900R012C00SPC300
OS SUSE Linux Enterprise Server 10 SP2
TOE Documentation
The supporting guidance documents evaluated were:
[a] USN9810 Product Documentation V900R012C00, 2013/08/05
[b] Common Criteria Secur ity Evaluation – Cert i f ied Configuration V1.2,
2013-11-12
Further discuss ion of the supporting guidance material is g iven in Section 4.3
“Instal lat ion and Guidance Documentation”.
Huawei USN9810 Unif ied Service Node Version V900R012 EAL3+
SERTIT-054 CR Issue 1.0
7 March 2014
Page 21 of 21
USN9810
172. 0. 111. 1
UGW9811/ FTP ser ver
172. 0. 112. 1
Swi t ch
Lapt op wi t h BT5
172. 2. 0. 2
PC3
UGW LMT
UGW M2000 LMT
Spi der as AAA
172. 2. 211. 8
PC2
USN LMT
USN M2000 LMT
172. 2. 211. 5
PC1
Spi der as UE
172. 2. 211. 11
M2000
172. 2. 200. 173
TOE Configuration
The TOE is tested by the evaluator on USN9810 V900R012C00SPC300.
The following conf iguration was used for test ing:
35
E
-OJ
崎
J卢23
←-←咽。 …-的
.〉.∞ 立。τ∞…后 〉的」「 咽Z
.υ2υlu4
』
寸 〈£ 由〈由 t
的
3mmvJ
-=umLE052-m响田 〉
zuhF
VZ
OOMUUι 00υu23ω
〉〉℃UHCUEωuuZUZhwUE帽』=呐响〈
HF-EDω〉主』=uu
EOZmuCZ』UωuFOUE帽Z
zggu
-hOUE
ω
4
』U』3HU335左右=哩。£
2
UBo-oczυω←石〉〉币
OF
Zωυ
Zω
ω它。 U→
∞∞二一ω〉〉何
的2工U
...~
u
斗d
co」「-」「配
寸 五υ」何三 〔川33回响
寸山笃 01←-LFEUJUh』U-t"52U
FON
Mωk
UCEU
-UHSιJ
υ
→〉』 ω的它马
主有占 OU川帽-bw-OEO-"
UZ-立。且UZEOZ帽uc-w』Uυ
C.....,
二3
工川UEmz333£
... Q.
〉民
υ
2、2
ω
0 ‘~、,。
•
υ
∞